Advertisement

Behavioral Keys in Cryptography and Security Systems

  • Marek R. OgielaEmail author
  • Lidia Ogiela
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 8)

Abstract

In this paper will be presented new ways of using some behavioral features and habits for security purposes and cryptography. In particular several different solutions will be described, which present possible application of selected behavioral patterns, characteristic for particular users. Such behavioral patterns can be extracted thanks to the application of new generation cognitive vision systems. Obtained personal feature, can be next use for security reasons, as well as in cognitive cryptographic protocols.

Notes

Acknowledgments

This work has been supported by the AGH University of Science and Technology research Grant No 11.11.120.329.

References

  1. 1.
    Cox, I.J., Miller, M.L., Bloom, J., Fridrich, J., Kalker, J.: Digital Watermarking and Steganography. Morgan Kaufmann Publishers, Burlington (2008)Google Scholar
  2. 2.
    Jin, Z., Teoh, A.B.J., Goi, B.-M., Tay, Y.-H.: Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56, 50–62 (2016)CrossRefGoogle Scholar
  3. 3.
    Ogiela, L.: Computational intelligence in cognitive healthcare information systems. Stud. Comput. Intell. 309, 347–369 (2010)Google Scholar
  4. 4.
    Ogiela, L.: Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122, 58–69 (2013)CrossRefGoogle Scholar
  5. 5.
    Ogiela, L., Ogiela, M.R.: Beginnings of cognitive science. In: Advances in Cognitive Information Systems. Cognitive Systems Monographs, vol. 17, pp. 1–18 (2012) Google Scholar
  6. 6.
    Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), Salerno, Italy, pp. 257–261, 10–12 September 2014Google Scholar
  7. 7.
    Ogiela, L., Ogiela, M.R.: Management information systems. In: Park, J., Pan, Y., Chao, H.C., Yi, G. (eds.) Ubiquitous Computing Application and Wireless Sensor. LNEE, vol. 331, pp. 449–456. Springer, Dordrecht (2015)Google Scholar
  8. 8.
    Ogiela, M.R., Ogiela, U.: Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking, Hainan Island, China, vol. 1, pp. 377–380, 13–15 December 2008Google Scholar
  9. 9.
    Ogiela, M.R., Ogiela, U.: Security of linguistic threshold schemes in multimedia systems. Stud. Comput. Intell. 226, 13–20 (2009)zbMATHGoogle Scholar
  10. 10.
    Ogiela, M.R., Ogiela, U.: Shadow generation protocol in linguistic threshold schemes. In: Ślęzak, D., Kim, T., Fang, W.C., Arnett, K.P. (eds.) Security Technology. CCIS, vol. 58, pp. 35–42. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  11. 11.
    Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. In: Kim, T.-h., Adeli, H. (eds.) ACN/AST/ISA/UCMA -2010. LNCS, vol. 6059, pp. 175–182. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-13577-4_15 CrossRefGoogle Scholar
  12. 12.
    Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London (2014)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Faculty of Electrical Engineering, Automatics, Computer Science and Biomedical EngineeringAGH University of Science and TechnologyKrakowPoland
  2. 2.Cryptography and Cognitive Informatics Research GroupAGH University of Science and TechnologyKrakowPoland

Personalised recommendations